Reverse Engineering a Philips TriMedia CPU based IP Camera – Part 3
Introduction Welcome to the final chapter of the Trimedia series. In the first part of the series, I introduced this...
Introduction Welcome to the final chapter of the Trimedia series. In the first part of the series, I introduced this...
Introduction After detailing Samsung's TrustZone implementation in the first part of this series, this blog post introduces the tools that...
Motivations After a general introduction on the ARM TrustZone and a focus on Qualcomm's implementation, this new series of articles...
Introduction This blog post deals with the Legu packer, an Android protector developed by Tencent that is currently one of...
Introduction Irma is our file security analysis software, originally developed as an open source project with the sponsorship of 5...
Uzbekistan plans to legalize mining by providing the status of a participant in the mining pool, which is planned to...
The EU (Europian Union) is considering restricting the use of facial recognition technology for a possible duration of 5 years,...
Undoubtedly, being an "Adult Webcam Model" means living a "revealing" life "out in the open". But to an extent where...
Scallion lets you create vanity GPG keys and .onion addresses (for Tor's hidden services) using OpenCL.Scallion runs on Mono (tested...
Bluewall is a firewall framework designed for offensive and defensive cyber professionals. This framework allows Cybersecurity professionals to quickly setup...
Have you ever noticed strange reviews of Google Play apps that look totally out of place? Their creators might give...
The Lazarus group is currently one of the most active and prolific APT actors. In 2018, Kaspersky published a report...
https://github.com/KasperskyLab/hb_dec Every once in a while we get a request that leaves us scratching our heads. With these types of...
After we wrote our private report on the OilRig leak, we decided to scan our archives with our YARA rule,...
All the statistics used in this report were obtained using Kaspersky Security Network (KSN), a distributed antivirus network that works...
It seems like every day we read another article about a data breach or leak of cloud storage exposing millions...
Last year, during October and November, 52 hackers were able to hack the US army. "It only strengthens our security...
Researchers at security firm Sophos has discovered a new set of Android apps present on the Google Play Store that...
Framework to test any Anti-Cheat on the market. This can be used as Template or Code Base to test any...
gowitness is a website screenshot utility written in Golang, that uses Chrome Headless to generate screenshots of web interfaces using...
On Dec. 17, 2019, a directory traversal vulnerability was announced in the Citrix Application Discovery Controller and Citrix Gateway, which...
Since resuming operations after a holiday hiatus, the malicious actors behind the Emotet banking trojan network have reportedly targeted at...
How do your favorite brands know to use your first name in the subject line of their emails? Why do...
For years, an annual, must-pass federal spending bill has served as a vehicle for minor or contentious provisions that might...